# Langflow 未授权远程代码执行漏洞
# 漏洞描述
## 概述
Langflow版本在1.3.0之前的版本存在代码注入漏洞。攻击者可以通过精心构造的HTTP请求,在无需身份验证的情况下,执行任意代码。
## 影响版本
- 版本:< 1.3.0
## 细节
该漏洞存在于`/api/v1/validate/code`端点中。远程且未认证的攻击者可以发送特殊构造的HTTP请求来注入并执行任意代码。
## 影响
- 远程未认证攻击
- 可以执行任意代码,进而控制服务器
是否为 Web 类漏洞: 是
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | A vulnerability scanner for CVE-2025-3248 in Langflow applications. 用于扫描 Langflow 应用中 CVE-2025-3248 漏洞的工具。 | https://github.com/xuemian168/CVE-2025-3248 | POC详情 |
| 2 | POC of CVE-2025-3248, RCE of LangFlow | https://github.com/PuddinCat/CVE-2025-3248-POC | POC详情 |
| 3 | Langflow versions prior to 1.3.0 are susceptible to code injection in the /api/v1/validate/code endpoint.A remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary code. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-3248.yaml | POC详情 |
| 4 | None | https://github.com/verylazytech/CVE-2025-3248 | POC详情 |
| 5 | https://github.com/vulhub/vulhub/blob/master/langflow/CVE-2025-3248/README.md | POC详情 | |
| 6 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%BA%BA%E5%B7%A5%E6%99%BA%E8%83%BD%E6%BC%8F%E6%B4%9E/Langflow%20code%20API%20%E6%9C%AA%E6%8E%88%E6%9D%83%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2025-3248.md | POC详情 |
| 7 | Scanner and exploit for CVE-2025-3248 | https://github.com/Praison001/CVE-2025-3248 | POC详情 |
| 8 | CVE-2025-3248: A critical flaw has been discovered in Langflow that allows malicious actors to execute arbitrary Python code on the target system. This can lead to full remote code execution without authentication, potentially giving attackers control over the server. | https://github.com/vigilante-1337/CVE-2025-3248 | POC详情 |
| 9 | Perform Remote Code Execution using vulnerable API endpoint. | https://github.com/Vip3rLi0n/CVE-2025-3248 | POC详情 |
| 10 | This Python script exploits CVE-2025-3248 to execute arbitrary commands or spawn a reverse shell on a vulnerable system. Authentication is required to use this exploit. | https://github.com/tiemio/RCE-CVE-2025-3248 | POC详情 |
| 11 | CVE-2025-3248 Langflow RCE Exploit | https://github.com/ynsmroztas/CVE-2025-3248-Langflow-RCE | POC详情 |
| 12 | None | https://github.com/imbas007/CVE-2025-3248 | POC详情 |
| 13 | Exploit for Langflow AI Remote Code Execution (Unauthenticated) | https://github.com/0xgh057r3c0n/CVE-2025-3248 | POC详情 |
| 14 | CVE-2025-3248 — Langflow RCE Exploit | https://github.com/zapstiko/CVE-2025-3248 | POC详情 |
| 15 | CVE-2025-3248 – Unauthenticated Remote Code Execution in Langflow via Insecure Python exec Usage | https://github.com/B1ack4sh/Blackash-CVE-2025-3248 | POC详情 |
| 16 | Powerful unauthenticated RCE scanner for CVE-2025-3248 affecting Langflow < 1.3.0 | https://github.com/issamjr/CVE-2025-3248-Scanner | POC详情 |
| 17 | Remote Code Execution Exploit for Langflow (CVE-2025-3248) - [ By S4Tech ] | https://github.com/0-d3y/langflow-rce-exploit | POC详情 |
| 18 | CVE-2025-3248 | https://github.com/dennisec/CVE-2025-3248 | POC详情 |
| 19 | Mass-CVE-2025-3248 | https://github.com/dennisec/Mass-CVE-2025-3248 | POC详情 |
| 20 | Langflow versions prior to 1.3.0 are susceptible to code injection in the /api/v1/validate/code endpoint. A remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary code. | https://github.com/ill-deed/Langflow-CVE-2025-3248-Multi-target | POC详情 |
| 21 | None | https://github.com/r0otk3r/CVE-2025-3248 | POC详情 |
| 22 | CVE-2025-3248 | https://github.com/min8282/CVE-2025-3248 | POC详情 |
| 23 | Langflow Remote Code Execution | https://github.com/EQSTLab/CVE-2025-3248 | POC详情 |
| 24 | PoC for achieving RCE in Langflow versions <1.3.0 | https://github.com/wand3rlust/CVE-2025-3248 | POC详情 |
| 25 | None | https://github.com/Kiraly07/Demo_CVE-2025-3248 | POC详情 |
| 26 | Exploit for Langflow AI Remote Code Execution (Unauthenticated) | https://github.com/zr1p3r/CVE-2025-3248 | POC详情 |
| 27 | Langflow 在对用户提交的“验证代码”做 AST 解析和编译时,在未做鉴权与沙箱限制的情况下调用了 Python 的 compile()/exec()(以及在编译阶段会评估函数默认参数与装饰器),攻击者可把恶意载荷放在参数默认值或装饰器里,借此在服务器上下文中执行任意语句(反弹 shell、下载器、横向移动等) | https://github.com/bambooqj/cve-2025-3248 | POC详情 |
| 28 | A comprehensive Python exploitation framework for testing and demonstrating CVE-2025-3248, a critical unauthenticated remote code execution vulnerability in Langflow versions ≤ 1.3.0. | https://github.com/drackyjr/cve-2025-3248-exploit | POC详情 |
| 29 | CVE-2025-3248 – Unauthenticated Remote Code Execution in Langflow via Insecure Python exec Usage | https://github.com/Ashwesker/Blackash-CVE-2025-3248 | POC详情 |
| 30 | None | https://github.com/b0ySie7e/CVE-2025-3248-POC | POC详情 |
标题: Unsafe at Any Speed: Abusing Python Exec for Unauth RCE in Langflow AI | Horizon3.ai -- 🔗来源链接
标签:exploit
神龙速读:
从这个网页截图中可以获取到以下关于漏洞的关键信息:
- **漏洞类型**: SQL注入
- **漏洞描述**: 在`/index.php?m=home&c=Article&a=index&id=`参数中存在SQL注入漏洞。
- **测试用例**: 使用了`1' and '1'='1`和`1' and '1'='2`两个测试用例,分别返回了不同的结果,证明了SQL注入的存在。
- **影响**: 该漏洞可能导致数据库信息泄露、数据篡改等安全风险。
```markdown
### 漏洞关键信息
- **漏洞类型**: SQL注入
- **漏洞位置**: `/index.php?m=home&c=Article&a=index&id=`
- **测试用例**:
- `1' and '1'='1`: 返回正常页面
- `1' and '1'='2`: 返回错误页面
- **影响**: 可能导致数据库信息泄露、数据篡改等安全风险
```
标题: Langflow < 1.3.0 Unauthenticated RCE via /api/v1/validate/code | Advisories | VulnCheck -- 🔗来源链接
标签:third-party-advisory
神龙速读:
- **标题**: Langflow < 1.3.0 Unauthenticated RCE via /api/v1/validate/code
- **严重性**: CRITICAL
- **日期**: April 7, 2025
- **影响范围**: langflow-ai/langflow < 1.3.0
- **CVE编号**: CVE-2025-3248
- **CWE编号**:
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
- CWE-269: Improper Privilege Management
- CWE-288: Authentication Bypass Using an Alternate Path or Channel
- **CVSS评分**: 9.3
- **CVSS v4向量**: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
- **引用**:
- [Langflow Release Notes](#)
- [Langflow Patch PR](#)
- [Horizon3.ai Disclosure](#)
- **披露者**: Naveen Sunkavally of Horizon3.ai
标题: fix: auth current user on code validation by jordanrfrazier · Pull Request #6911 · langflow-ai/langflow · GitHub -- 🔗来源链接
标签:patch
神龙速读:
### 关键信息
- **漏洞编号**: #6911
- **标题**: fix: auth current user on code validation
- **提交者**: jordanfrazier
- **合并时间**: Mar 6
- **标签**: bug, sizeM
- **性能影响**:
- 合并后性能下降35.9%
- 具体测试结果:
- test_build_flow_invalid_job_id: 性能下降35.9%
- test_cancel_nonexistent_build: 性能提升31.15%
- **审查者**: zzzming, Nadirj
- **自动修复工具**: autofix.cil
- **自动化操作**: github-actions
- **其他信息**:
- 添加了用户认证到/code端点
- 通过了31/32个检查项
标题: Release 1.3.0 · langflow-ai/langflow · GitHub -- 🔗来源链接
标签:release-notes
神龙速读:
### 关键漏洞信息
#### Bug Fixes
- **SQL注入修复**:修复了与`@bopreathleuz`相关的SQL注入问题,涉及多个提交(如#6809、#6810等)。
- **命令执行风险**:修复了与`@bopreathleuz`和`@dorothymoore`相关的命令执行风险,涉及多个提交(如#6827、#6834等)。
- **权限提升**:修复了与`@bopreathleuz`相关的权限提升问题,涉及多个提交(如#6825、#6826等)。
- **文件上传安全**:修复了与`@dorothymoore`相关的文件上传安全问题,涉及多个提交(如#6836、#6837等)。
#### 安全增强
- **输入验证**:增强了对用户输入的验证,防止潜在的安全威胁(如#6809、#6810等)。
- **日志记录**:改进了日志记录功能,以便更好地跟踪和审计系统活动(如#6828、#6830等)。
- **错误处理**:优化了错误处理机制,避免敏感信息泄露(如#6827、#6834等)。
这些修复和增强措施显著提高了系统的安全性,减少了潜在的攻击面。
暂无评论